Several cryptographic schemes and applications are based on functions that are both reasonably efficient to compute and moderately hard to invert, including client puzzles for Denial-of-Service protection, password protection via salted hashes, or recent proof-of-work blockchain systems. Despite their wide use, a definition of this concept has not yet been distilled and formalized explicitly. Instead, either the applications are proven directly based on the assumptions underlying the function, or some property of the function is proven, but the security of the application is argued only informally. The goal of this work is to provide a (universal) definition that decouples the efforts of designing new moderately hard functions and of buildi...
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a ...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
A memory-hard function (MHF) $f_n$ with parameter $n$ can be computed in sequential time and space $...
Several cryptographic schemes and applications are based on functions that are both reasonably effic...
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of ...
Abstract. Cryptographic puzzles are moderately difficult problems that can be solved by investing no...
Memory-hard functions (MHFs) is a class of hash functions whose fast evaluation requires the heavy u...
Algorithm hardness can be described by 5 categories: hardness in computation, in sequential computat...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
Abstract. Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be so...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the c...
© International Association for Cryptologic Research 2017. Much of modern cryptography, starting fro...
Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are...
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a ...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
A memory-hard function (MHF) $f_n$ with parameter $n$ can be computed in sequential time and space $...
Several cryptographic schemes and applications are based on functions that are both reasonably effic...
A key idea in cryptography is using hard functions in order to obtain secure schemes. The theory of ...
Abstract. Cryptographic puzzles are moderately difficult problems that can be solved by investing no...
Memory-hard functions (MHFs) is a class of hash functions whose fast evaluation requires the heavy u...
Algorithm hardness can be described by 5 categories: hardness in computation, in sequential computat...
Thesis: Ph. D., Massachusetts Institute of Technology, Department of Electrical Engineering and Comp...
The main efficiency metrics for a cryptographic primitive are its speed, its code size and its memor...
Abstract. Cryptographic puzzles (or client puzzles) are moderately difficult problems that can be so...
International audienceThe main efficiency metrics for a cryptographic primitive are its speed, its c...
Memory Hard Functions (MHFs) have been proposed as an answer to the growing inequality between the c...
© International Association for Cryptologic Research 2017. Much of modern cryptography, starting fro...
Abstract. We introduce the concept of strict memory hard functions. Strict memory hard functions are...
Client puzzles are meant to act as a defense against denial of service (DoS) attacks by requiring a ...
We introduce new and general complexity theoretic hardness assumptions. These assumptions abstract o...
A memory-hard function (MHF) $f_n$ with parameter $n$ can be computed in sequential time and space $...